Hi Chuck, On Mon, Mar 28, 2016 at 11:51 AM, Chuck Lever <chuck.lever@xxxxxxxxxx> wrote: > At Connectathon 2016, we found that recent upstream Linux clients > would occasionally send a LOCK operation with a zero stateid. This > appeared to happen in close proximity to another thread returning > a delegation before unlinking the same file while it remained open. > > Earlier, the client received a write delegation on this file and > returned the open stateid. Now, as it is getting ready to unlink the > file, it returns the write delegation. But there is still an open > file descriptor on that file, so the client must OPEN the file > again before it returns the delegation. > > Since commit 24311f884189 ('NFSv4: Recovery of recalled read > delegations is broken'), nfs_open_delegation_recall() clears the > NFS_DELEGATED_STATE flag _before_ it sends the OPEN. This allows a > racing LOCK on the same inode to be put on the wire before the OPEN > operation has returned a valid open stateid. > > After the OPEN(CLAIM_DELEG_CUR_FH) returns, the client holds both > a write delegation and a valid open stateid. It is safe to clear > NFS_DELEGATED_STATE at that point, allowing fresh lock requests > to go on the wire using the newly acquired open stateid. > > I'm not certain of this fix. nfs4_handle_delegation_recall_error() > is called from both nfs_open_delegation_recall() and > nfs_lock_delegation_recall(). Is it safe and correct to clear > NFS_DELEGATED_STATE after success in both of these code paths? > I'm not seeing why the subject line is tagged as describing an xprtrdma issue. Was that intentional? Secondly, would it perhaps make more sense to have the locking code simply wait for the outstanding delegation return recovery? Otherwise, I worry that we are exchanging one timing-specific problem for another. Thanks Trond -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html